The fun part of pentesting is the hacking. But the part that makes it a viable career is the reporting. You can develop the most amazing exploit for the most surprising vulnerability, but if you can't document it clearly for the people who need to fix it, then you're just having fun. Which is fine! But if you want to get hired again, your reports need to be as clear and useful as your hacks are awesome.
There are a few fundamental things that should guide your report-writing. You'll hear about those, and also learn some techniques and shortcuts to make sure you're following them consistently. You'll see some before-and-after examples of a bad report made good, with clear explanations of what makes the difference.

Brian spent about seven years pentesting inside large finance organizations before joining Black Hills Infosec three years ago to pentest lots of other things. He believes that communicating is just as important as technical skills, and need not be as uncomfortable as we sometimes make it out to be.